|
|
Books > Computing & IT
The damaging effects of cyberattacks to an industry like the
Cooperative Connected and Automated Mobility (CCAM) can be
tremendous. From the least important to the worst ones, one can
mention for example the damage in the reputation of vehicle
manufacturers, the increased denial of customers to adopt CCAM, the
loss of working hours (having direct impact on the European GDP),
material damages, increased environmental pollution due e.g., to
traffic jams or malicious modifications in sensors' firmware, and
ultimately, the great danger for human lives, either they are
drivers, passengers or pedestrians. Connected vehicles will soon
become a reality on our roads, bringing along new services and
capabilities, but also technical challenges and security threats.
To overcome these risks, the CARAMEL project has developed several
anti-hacking solutions for the new generation of vehicles. CARAMEL
(Artificial Intelligence-based Cybersecurity for Connected and
Automated Vehicles), a research project co-funded by the European
Union under the Horizon 2020 framework programme, is a project
consortium with 15 organizations from 8 European countries together
with 3 Korean partners. The project applies a proactive approach
based on Artificial Intelligence and Machine Learning techniques to
detect and prevent potential cybersecurity threats to autonomous
and connected vehicles. This approach has been addressed based on
four fundamental pillars, namely: Autonomous Mobility, Connected
Mobility, Electromobility, and Remote Control Vehicle. This book
presents theory and results from each of these technical
directions.
Machine Learning for Subsurface Characterization develops and
applies neural networks, random forests, deep learning,
unsupervised learning, Bayesian frameworks, and clustering methods
for subsurface characterization. Machine learning (ML) focusses on
developing computational methods/algorithms that learn to recognize
patterns and quantify functional relationships by processing large
data sets, also referred to as the "big data." Deep learning (DL)
is a subset of machine learning that processes "big data" to
construct numerous layers of abstraction to accomplish the learning
task. DL methods do not require the manual step of
extracting/engineering features; however, it requires us to provide
large amounts of data along with high-performance computing to
obtain reliable results in a timely manner. This reference helps
the engineers, geophysicists, and geoscientists get familiar with
data science and analytics terminology relevant to subsurface
characterization and demonstrates the use of data-driven methods
for outlier detection, geomechanical/electromagnetic
characterization, image analysis, fluid saturation estimation, and
pore-scale characterization in the subsurface.
Computing in Communication Networks: From Theory to Practice
provides comprehensive details and practical implementation tactics
on the novel concepts and enabling technologies at the core of the
paradigm shift from store and forward (dumb) to compute and forward
(intelligent) in future communication networks and systems. The
book explains how to create virtualized large scale testbeds using
well-established open source software, such as Mininet and Docker.
It shows how and where to place disruptive techniques, such as
machine learning, compressed sensing, or network coding in a newly
built testbed. In addition, it presents a comprehensive overview of
current standardization activities. Specific chapters explore
upcoming communication networks that support verticals in
transportation, industry, construction, agriculture, health care
and energy grids, underlying concepts, such as network slicing and
mobile edge cloud, enabling technologies, such as SDN/NFV/ ICN,
disruptive innovations, such as network coding, compressed sensing
and machine learning, how to build a virtualized network
infrastructure testbed on one's own computer, and more.
Artificial intelligence and its various components are rapidly
engulfing almost every professional industry. Specific features of
AI that have proven to be vital solutions to numerous real-world
issues are machine learning and deep learning. These intelligent
agents unlock higher levels of performance and efficiency, creating
a wide span of industrial applications. However, there is a lack of
research on the specific uses of machine/deep learning in the
professional realm. Machine Learning and Deep Learning in Real-Time
Applications provides emerging research exploring the theoretical
and practical aspects of machine learning and deep learning and
their implementations as well as their ability to solve real-world
problems within several professional disciplines including
healthcare, business, and computer science. Featuring coverage on a
broad range of topics such as image processing, medical
improvements, and smart grids, this book is ideally designed for
researchers, academicians, scientists, industry experts, scholars,
IT professionals, engineers, and students seeking current research
on the multifaceted uses and implementations of machine learning
and deep learning across the globe.
 |
Principles of Security and Trust
- 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings
(Hardcover)
Lujo Bauer, Ralf Kusters
|
R1,547
Discovery Miles 15 470
|
Ships in 18 - 22 working days
|
|
|
Artificial intelligence serves as a catalyst for transformation in
the field of education. This shift in the educational paradigm has
a profound impact on the way we live, interact with each other, and
define our values. Thus, there is a need for an earnest inquiry
into the cultural repercussions of this phenomenon that extends
beyond superficial analyses of AI-based applications in education.
Cultural and Social Implications of Artificial Intelligence in
Education addresses the need for a scholarly exploration of the
cultural and social impacts of the rapid expansion of artificial
intelligence in the field of education including potential
consequences these impacts could have on culture, social relations,
and values. The content within this publication covers such topics
as ethics, critical thinking, and augmented intelligence and is
designed for educators, academicians, administrators, researchers,
and professionals.
Clinical Engineering: A Handbook for Clinical and Biomedical
Engineers, Second Edition, helps professionals and students in
clinical engineering successfully deploy medical technologies. The
book provides a broad reference to the core elements of the
subject, drawing from a range of experienced authors. In addition
to engineering skills, clinical engineers must be able to work with
both patients and a range of professional staff, including
technicians, clinicians and equipment manufacturers. This book will
not only help users keep up-to-date on the fast-moving scientific
and medical research in the field, but also help them develop
laboratory, design, workshop and management skills. The updated
edition features the latest fundamentals of medical technology
integration, patient safety, risk assessment and assistive
technology.
Advances in Imaging and Electron Physics, Volume 227 in the
Advances in Imaging and Electron Physics series, merges two
long-running serials, Advances in Electronics and Electron Physics
and Advances in Optical and Electron Microscopy. The series
features articles on the physics of electron devices (especially
semiconductor devices), particle optics at high and low energies,
microlithography, image science, digital image processing,
electromagnetic wave propagation, electron microscopy and the
computing methods used in all these domains.
Through an array of detailed case studies, this book explores the
vibrant digital expressions of diverse groups of Muslim cybernauts:
religious clerics and Sufis, feminists and fashionistas, artists
and activists, hajj pilgrims and social media influencers. These
stories span a vast cultural and geographic landscape—from
Indonesia, Iran, and the Arab Middle East to North America. These
granular case studies contextualize cyber Islam within broader
social trends: racism and Islamophobia, gender dynamics, celebrity
culture, identity politics, and the shifting terrain of
contemporary religious piety and practice. The book’s authors
examine an expansive range of digital multimedia technologies as
primary “texts.” These include websites, podcasts, blogs,
Twitter, Facebook, Instagram, YouTube channels, online magazines
and discussion forums, and religious apps. The contributors also
draw on a range of methodological and theoretical models from
multiple academic disciplines, including communication and media
studies, anthropology, history, global studies, religious studies,
and Islamic studies.
Cellular Internet of Things: From Massive Deployments to Critical
5G Applications, Second Edition, gives insights into the recent and
rapid work performed by the 3rd Generation Partnership Project
(3GPP) and the Multefire Alliance (MFA) to develop systems for the
Cellular IoT. Beyond the technologies, readers will learn what the
mMTC and cMTC market segments look like, deployment options and
expected performance in terms of system capacity, expected battery
lifetime, data throughput, access delay time and device cost,
regulations for operation in unlicensed frequency bands, and how
they impact system design and performance. This new edition
contains updated content on the latest EC-GSM IoT, LTE-M and NB-IoT
features in 3GPP Release 15, critical communication, i.e. URLLC,
specified in 3GPP Release 15 for both LTE and NR, LTE-M and NB-IoT
for unlicensed frequency bands specified in the Multefire Alliance
(MFA), and an updated outlook of what the future holds in
Industrial IoT and drone communications, amongst other topics.
In the computer science industry, high levels of performance remain
the focal point in software engineering. This quest has made
current systems exceedingly complex, as practitioners strive to
discover novel approaches to increase the capabilities of modern
computer structures. A prevalent area of research in recent years
is scalable transaction processing and its usage in large databases
and cloud computing. Despite its popularity, there remains a need
for significant research in the understanding of scalability and
its performance within distributed databases. Handling Priority
Inversion in Time-Constrained Distributed Databases provides
emerging research exploring the theoretical and practical aspects
of database transaction processing frameworks and improving their
performance using modern technologies and algorithms. Featuring
coverage on a broad range of topics such as consistency mechanisms,
real-time systems, and replica management, this book is ideally
designed for IT professionals, computing specialists, developers,
researchers, data engineers, executives, academics, and students
seeking research on current trends and developments in distributed
computing and databases.
Air Route Networks through Complex Networks Theory connects theory
research with network connectivity analysis, providing
practitioners with the tools they need to develop more efficient,
resilient and profitable air route networks. The book helps airline
route planners and executives create more robust route networks
that are less vulnerable to disruptions, such as node isolation.
The book further explores errors and attacks in complex networks,
strategies for detecting critical nodes and cascading failure
models to assess and maximize robustness. The book explains how to
measure air route network connectivity with complex network
representations. Air transport is among the most dynamic and
toughest competition industries in today's global economy. The
quality of air route network design is a key strategic factor in an
airline's viability. These robust networks provide for more stable
and secure carrier operations vs. those based simply on existing
supply and demand volumes. Node-specific and network-specific
representations are covered, along with in-depth coverage of
connectivity in special and temporal networks. These collective
tools serve as a guide for practitioners seeking to apply complex
network theory to the airline industry.
|
|